The UNF Package. R topics documented: June 2, Title Tools for creating universal numeric fingerprints for data. Version 1.16.
|
|
- Darren Shields
- 6 years ago
- Views:
Transcription
1 The UNF Package June 2, 2007 Title Tools for creating universal numeric fingerprints for data. Version 1.16 Date Author Micah Altman Description Computes a univeral numeric fingerprint of the data. Maintainer Micah Altman <Micah_Altman@harvard.edu> Dialect R, S-Plus Depends R (>= 2.0) Imports utils License GPL 2.0 URL R topics documented: signifz unf Index 6 1
2 2 signifz signifz round values to specified number of significant digits Description Rounds the value to a specified number of significant digits, using IEEE 754 rounding towards zero rounding mode Usage signifz (x, digits=6) Arguments x digits A numeric vector. integer indicating the precision to be used Details signifz rounds the values in its first argument to the specified number of significant digits, using IEC 60559/IEEE 754 round towards zero mode. Rounding toward zero assures that signifz(signifz(x,digits=m),digits=n) = signifz(x,digits=n) for m > n, an important property for creating approximate fingerprints. It can, however, produce more rounding error than rounding toward nearest. The maximum log relative error (LRE) for the former is (digits-1) while the maximum LRE for the latter is digits. Hence, you may wish to use one more significant digit with signifz than with signif. Author(s) Micah Altman Micah_Altman@harvard.edu See Also signif, unf Examples # note the difference signif(pi,digits=5) signifz(pi,digits=5)
3 unf 3 unf universal numeric fingerprint Description Usage A universal numeric fingerprint is used to guarantee that a defined subset of data is substantively identical to a comparison subset. Two fingerprints will match if and only if the subset of data generating them are identical, when represented using a given number of significant digits. Arguments data digits ndigits cdigits version rowindexvar roworder x Details char unf(data, digits = NULL, ndigits = { if (is.null(digits)) { 8 } else (digits)}, cdigits = { if (is.null(digits)) { 128 } else (digits)}, version = 4.1, rowindexvar = NULL, roworder = { if (is.null(rowindexvar)) { NULL } else { order(rowindexvar) }}) unf2base64 (x) as.character.unf(x,...) as.unf(char) A numeric or charactervector or data frame. Other types will be computed. number of digits to use, see cdigits and ndigits number of significant digits for rounding for numeric values prior to applying cryptographic hash number of characters for truncation prior to applying cryptographic hash algorithmic version. Always use the same version of the algorithm to check a signature. a vector of rowids. The resulting data will be sorted by this vector before the UNF s are computed. This will affect the UNF for each vector. This is equivalent to unf(df[order(rowindexvar),] explicit sort ordering, an alternative to using rowindexvar a unf object, returned by unf a character vector of UNF character strings... part of the as.character generic, ignored A UNF is created by rounding data values (or truncating strings) to a known number of digits (characters), representing those values in standard form (as 32bit unicode-formatted strings), and applying a fingerprinting method (such as cryptographic hashing function) to this representation. UNF s are computed from data values provided by the statistical package, so they directly reflect the internal representation of the data the data as the statistical package interprets it.
4 4 unf Value A UNF differs from an ordinary file checksum in several important ways: 1. UNF s are format independent. The UNF for the data will be the same regardless of whether the data is saved as a R binary format, SAS formatted file, Stata formatted file, etc., but file checksums will differ. 2. UNF s are robust to insignificant rounding error. A UNF will also be the same if the data differs in non-significant digits, a file checksum not. 3.UNF s detect misinterpretation of the data by the statistical software. If the statistical software misreads the file, the resulting UNF will not match the original, but the file checksums may match. 4.UNF s are strongly tamper resistant. Any accidental or intentional changes to the data values will change the resulting UNF. Most file checksums s and descriptive statistics detect only certain types of changes. UNF libraries are available for standalone use, for use in C++, and for use with other packages. The unf function returns a UNF object which can be converted using as.character to a signature string. For example: UNF:3:10,128:ZNQRI14053UZq389x0Bffg== This representation identifies the signature as a fingerprint, using version 3, of the algorithm, computed to 10 significant digits for numbers and 128 for characters. The segment following the final colon is the actual fingerprint in base64 encoded format. Note: to compare two UNF s, or sets of unfs, one often wants to compare only the base64 portion. Use unf2base64 for this, which will extract the base64 portion. Use summary to produce a single UNF from set of vectors, by computing a new UNF across the base64 strings. The order in which the set of vectors is important. Author(s) Micah Altman Micah_Altman@harvard.edu References Altman, M., J. Gill and M. P. McDonald Numerical Issues in Statistical Computing for the Social Scientist. John Wiley & Sons. issues/ [Defining the algorithm] Altman, M., & G. King A Proposed Standard for the Scholarly Citation of Quantitative Data. D-Lib 13(3/4). [Citation standard using UNF s] Examples # simple example v=1:100/ vr=signif(v,digits=2)
5 unf 5 # print.unf shows in standard format, including version and digits print(unf(v)) # as.character will return base64 section only for comparisons as.character(unf(v)) # this is false, since computed base64 values UNF's differ unf2base64(unf(v))==unf2base64(unf(vr)) # this is true, since computed UNF's base64 values are the same at 2 significant digits unf2base64(unf(v, digits=2))==unf2base64(unf(vr)) # WARNING: this is false, since UNF's values are the same, but # number of calculated digits differ, probably not the comparison # you intend identical(unf(v,digits=2),unf(vr)) # compute a fingerprint of longley at 10 significant digits of accuracy for numeric values # this fingerprint can be stored and verified when reading the dataset # later data(longley) mf10<-unf(longley,ndigits=10); # this produces the same results as using signifz(), but not signif() mf11<-unf(signifz(longley,digits=10)) unf2base64(mf11)==unf2base64(mf10) #printable representation, prints seven UNF's, one for each vector print(mf10) # summarizes the base64 portion of the unf for each vector into a # single base64 UNF representing entire dataset summary(mf10)
6 Index Topic debugging unf, 2 Topic math signifz, 1 Topic misc signifz, 1 unf, 2 as.character.unf (unf), 2 as.unf (unf), 2 signifz, 1 unf, 2 unf2base64 (unf), 2 6
Package UNF. June 13, 2017
Version 2.0.6 Package UNF June 13, 2017 Title Tools for Creating Universal Numeric Fingerprints for Data Date 2017-06-13 Description Computes a universal numeric fingerprint (UNF) for an R data object.
More informationA Fingerprint Method for Scientific Data Verification 1 Version: 09/14/2009
A Fingerprint Method for Scientific Data Verification 1 Version: 09/14/2009 Micah Altman Institute for Quantitative Social Science, Harvard University 1737 Cambridge St. # 325 Cambridge, MA 02138 Micah_Altman@harvard.edu
More informationThe VDCutil Package. July 10, 2006
Title utilities supporting the VDC system Version 1.12 Author Micah Altman, Akio Sone Date 2006-07-06 The VDCutil Package July 10, 2006 The VDC system is an open source digital library system for quantitative
More informationData Types Literals, Variables & Constants
C/C++ PROGRAMMING Data Types Literals, Variables & Constants Copyright 2013 Dan McElroy Under the Hood As a DRIVER of an automobile, you may not need to know everything that happens under the hood, although
More informationAvro Specification
Table of contents 1 Introduction...2 2 Schema Declaration... 2 2.1 Primitive Types... 2 2.2 Complex Types...2 2.3 Names... 5 2.4 Aliases... 6 3 Data Serialization...6 3.1 Encodings... 7 3.2 Binary Encoding...7
More informationAvro Specification
Table of contents 1 Introduction...2 2 Schema Declaration... 2 2.1 Primitive Types... 2 2.2 Complex Types...2 2.3 Names... 5 3 Data Serialization...6 3.1 Encodings... 6 3.2 Binary Encoding...6 3.3 JSON
More informationVariables and Data Representation
You will recall that a computer program is a set of instructions that tell a computer how to transform a given set of input into a specific output. Any program, procedural, event driven or object oriented
More informationData Entry, and Manipulation. DataONE Community Engagement & Outreach Working Group
Data Entry, and Manipulation DataONE Community Engagement & Outreach Working Group Lesson Topics Best Practices for Creating Data Files Data Entry Options Data Integration Best Practices Data Manipulation
More informationCryptographic Hash Functions. Rocky K. C. Chang, February 5, 2015
Cryptographic Hash Functions Rocky K. C. Chang, February 5, 2015 1 This set of slides addresses 2 Outline Cryptographic hash functions Unkeyed and keyed hash functions Security of cryptographic hash functions
More informationPackage datasets.load
Title Interface for Loading Datasets Version 0.1.0 Package datasets.load December 14, 2016 Visual interface for loading datasets in RStudio from insted (unloaded) s. Depends R (>= 3.0.0) Imports shiny,
More informationBEFORE NOON-time of Wed 24 April, 2019
Page 1 (c) Copyright A. Gerbessiotis. All rights reserved. Posting this document on the Web, other than its original location at NJIT, is strictly prohibited unless there is an explicit written authorization
More informationXDS An Extensible Structure for Trustworthy Document Content Verification Simon Wiseman CTO Deep- Secure 3 rd June 2013
Assured and security Deep-Secure XDS An Extensible Structure for Trustworthy Document Content Verification Simon Wiseman CTO Deep- Secure 3 rd June 2013 This technical note describes the extensible Data
More informationFull file at
Java Programming, Fifth Edition 2-1 Chapter 2 Using Data within a Program At a Glance Instructor s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional
More informationPackage geojsonsf. R topics documented: January 11, Type Package Title GeoJSON to Simple Feature Converter Version 1.3.
Type Package Title GeoJSON to Simple Feature Converter Version 1.3.0 Date 2019-01-11 Package geojsonsf January 11, 2019 Converts Between GeoJSON and simple feature objects. License GPL-3 Encoding UTF-8
More informationCSC Java Programming, Fall Java Data Types and Control Constructs
CSC 243 - Java Programming, Fall 2016 Java Data Types and Control Constructs Java Types In general, a type is collection of possible values Main categories of Java types: Primitive/built-in Object/Reference
More informationPackage Rserve. R topics documented: February 19, Version Title Binary R server
Version 1.7-3 Title Binary R server Package Rserve February 19, 2015 Author Simon Urbanek Maintainer Simon Urbanek Depends R (>= 1.5.0) Suggests
More informationMath 4242 Polynomial Time algorithms, IndependentSet problem
Math 4242 Polynomial Time algorithms, IndependentSet problem Many of the algorithms we have looked at so far have a reasonable running time. Not all algorithms do. We make this idea more precise. Definition:
More informationPackage OLScurve. August 29, 2016
Type Package Title OLS growth curve trajectories Version 0.2.0 Date 2014-02-20 Package OLScurve August 29, 2016 Maintainer Provides tools for more easily organizing and plotting individual ordinary least
More informationScience Panel Discussion presentation: "A Data Sharing Story"
University of Massachusetts Medical School escholarship@umms University of Massachusetts and New England Area Librarian e-science Symposium 2012 e-science Symposium Apr 4th, 10:45 AM - 11:15 AM Science
More informationChapter 2 Using Data. Instructor s Manual Table of Contents. At a Glance. Overview. Objectives. Teaching Tips. Quick Quizzes. Class Discussion Topics
Java Programming, Sixth Edition 2-1 Chapter 2 Using Data At a Glance Instructor s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional Projects Additional
More informationFull file at
Java Programming: From Problem Analysis to Program Design, 3 rd Edition 2-1 Chapter 2 Basic Elements of Java At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class
More informationPackage rjazz. R topics documented: March 21, 2018
Type Package Title Official Client for 'Jazz' Version 0.1.7 Date 2018-03-19 Depends R (>= 3.1.0) Imports stats, RCurl Package rjazz March 21, 2018 This is the official 'Jazz' client. 'Jazz' is a lightweight
More informationPackage dotcall64. January 11, 2018
Type Package Package dotcall64 January 11, 2018 Title Enhanced Foreign Function Interface Supporting Long Vectors Version 0.9-5.2 Date 2018-01-11 Description Provides.C64(), which is an enhanced version
More informationLanguage Features. 1. The primitive types int, double, and boolean are part of the AP
Language Features 1. The primitive types int, double, and boolean are part of the AP short, long, byte, char, and float are not in the subset. In particular, students need not be aware that strings are
More informationUsing the SA4 Command Line Interface (PRELIMINARY DRAFT)
Using the SA4 Command Line Interface (PRELIMINARY DRAFT) This chapter describes the SecretAgent 4 command line interface. The options and usage are identical for Windows/MS-DOS and UNIX versions of SecretAgent.
More informationA Data Sharing System
Dataverse Network A Data Sharing System Merce Crosas (mcrosas@hmdc.harvard.edu) Director of Product Development Institute of Quantitative Social Science (IQSS) Harvard University A long history of data
More informationThe DICOM Package. August 23, Title Import medical imaging data using the DICOM Standard
The DICOM Package August 23, 2005 Version 0.12 Date 2005-8-23 Title Import medical imaging data using the DICOM Standard Author Brandon Whitcher Maintainer Brandon Whitcher
More informationIntroducing Hashing. Chapter 21. Copyright 2012 by Pearson Education, Inc. All rights reserved
Introducing Hashing Chapter 21 Contents What Is Hashing? Hash Functions Computing Hash Codes Compressing a Hash Code into an Index for the Hash Table A demo of hashing (after) ARRAY insert hash index =
More informationECMA-404. The JSON Data Interchange Syntax. 2 nd Edition / December Reference number ECMA-123:2009
ECMA-404 2 nd Edition / December 2017 The JSON Data Interchange Syntax Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International 2017 Contents Page 1 Scope...
More informationPackage redux. May 31, 2018
Title R Bindings to 'hiredis' Version 1.1.0 Package redux May 31, 2018 A 'hiredis' wrapper that includes support for transactions, pipelining, blocking subscription, serialisation of all keys and values,
More informationCourse Outline and Objectives: Database Programming with SQL
Introduction to Computer Science and Business Course Outline and Objectives: Database Programming with SQL This is the second portion of the Database Design and Programming with SQL course. In this portion,
More informationPackage frt. R topics documented: February 19, 2015
Package frt February 19, 2015 Version 0.1 Date 2011-12-31 Title Full Randomization Test Author Giangiacomo Bravo , Lucia Tamburino . Maintainer Giangiacomo
More informationprint inf + 42,"\n"; print NaN * 7,"\n"; print hex("0x "),"\n"; # Perl v or later
NAME bigint - Transparent BigInteger support for Perl SYNOPSIS use bigint; $x = 2 + 4.5,"\n"; # BigInt 6 print 2 ** 512,"\n"; # really is what you think it is print inf + 42,"\n"; # inf print NaN * 7,"\n";
More informationNumber Systems Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. Indian Institute of Technology Kharagpur Number Representation
Number Systems Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. Indian Institute of Technology Kharagpur 1 Number Representation 2 1 Topics to be Discussed How are numeric data items actually
More informationPackage PKI. September 16, 2017
Version 0.1-5.1 Package PKI September 16, 2017 Title Public Key Infrastucture for R Based on the X.509 Standard Author Maintainer Depends R (>=
More informationQuestion 4: a. We want to store a binary encoding of the 150 original Pokemon. How many bits do we need to use?
Question 4: a. We want to store a binary encoding of the 150 original Pokemon. How many bits do we need to use? b. What is the encoding for Pikachu (#25)? Question 2: Flippin Fo Fun (10 points, 14 minutes)
More informationLecture 4: Hashes and Message Digests,
T-79.159 Cryptography and Data Security Lecture 4: Hashes and Message Digests Helsinki University of Technology mjos@tcs.hut.fi 1 Cryptographic hash functions Maps a message M (a bit string of arbitrary
More informationPackage kirby21.base
Type Package Package kirby21.base October 11, 2017 Title Example Data from the Multi-Modal MRI 'Reproducibility' Resource Version 1.6.0 Date 2017-10-10 Author John Muschelli Maintainer
More informationPace University. Fundamental Concepts of CS121 1
Pace University Fundamental Concepts of CS121 1 Dr. Lixin Tao http://csis.pace.edu/~lixin Computer Science Department Pace University October 12, 2005 This document complements my tutorial Introduction
More informationPackage testit. R topics documented: June 14, 2018
Package testit June 14, 2018 Type Package Title A Simple Package for Testing R Packages Version 0.8 Description Provides two convenience functions assert() and test_pkg() to facilitate testing R packages.
More informationSystems Programming/ C and UNIX
Systems Programming/ C and UNIX Alice E. Fischer Lecture 5 Makefiles October 2, 2017 Alice E. Fischer Lecture 5 Makefiles Lecture 5 Makefiles... 1/14 October 2, 2017 1 / 14 Outline 1 Modules and Makefiles
More informationAP COMPUTER SCIENCE JAVA CONCEPTS IV: RESERVED WORDS
AP COMPUTER SCIENCE JAVA CONCEPTS IV: RESERVED WORDS PAUL L. BAILEY Abstract. This documents amalgamates various descriptions found on the internet, mostly from Oracle or Wikipedia. Very little of this
More informationInformats. Informats Under UNIX. HEXw. informat. $HEXw. informat. Details CHAPTER 13
207 CHAPTER 13 Informats Informats Under UNIX 207 Informats Under UNIX This chapter describes SAS informats that have behavior or syntax this is specific to UNIX environments. Each informat description
More informationTopics Applications Most Common Methods Serial Search Binary Search Search by Hashing (next lecture) Run-Time Analysis Average-time analysis Time anal
CSC212 Data Structure t Lecture 18 Searching Instructor: George Wolberg Department of Computer Science City College of New York @ George Wolberg, 2016 1 Topics Applications Most Common Methods Serial Search
More informationPrimitive Data Types: Intro
Primitive Data Types: Intro Primitive data types represent single values and are built into a language Java primitive numeric data types: 1. Integral types (a) byte (b) int (c) short (d) long 2. Real types
More informationunused unused unused unused unused unused
BCD numbers. In some applications, such as in the financial industry, the errors that can creep in due to converting numbers back and forth between decimal and binary is unacceptable. For these applications
More informationSAS 9 Programming Enhancements Marje Fecht, Prowerk Consulting Ltd Mississauga, Ontario, Canada
SAS 9 Programming Enhancements Marje Fecht, Prowerk Consulting Ltd Mississauga, Ontario, Canada ABSTRACT Performance improvements are the well-publicized enhancement to SAS 9, but what else has changed
More informationCOMP 250 Fall recurrences 2 Oct. 13, 2017
COMP 250 Fall 2017 15 - recurrences 2 Oct. 13, 2017 Here we examine the recurrences for mergesort and quicksort. Mergesort Recall the mergesort algorithm: we divide the list of things to be sorted into
More informationChapter 1 Summary. Chapter 2 Summary. end of a string, in which case the string can span multiple lines.
Chapter 1 Summary Comments are indicated by a hash sign # (also known as the pound or number sign). Text to the right of the hash sign is ignored. (But, hash loses its special meaning if it is part of
More informationIntroduction to Computer Science and Business
Introduction to Computer Science and Business This is the second portion of the Database Design and Programming with SQL course. In this portion, students implement their database design by creating a
More informationCS 251 Intermediate Programming Java Basics
CS 251 Intermediate Programming Java Basics Brooke Chenoweth University of New Mexico Spring 2018 Prerequisites These are the topics that I assume that you have already seen: Variables Boolean expressions
More informationData Types Literals, Variables & Constants
VISUAL BASIC Data Types Literals, Variables & Constants Copyright 2013 Dan McElroy Under the Hood As a DRIVER of an automobile, you may not need to know everything that happens under the hood, although
More informationExcerpt from "Art of Problem Solving Volume 1: the Basics" 2014 AoPS Inc.
Chapter 5 Using the Integers In spite of their being a rather restricted class of numbers, the integers have a lot of interesting properties and uses. Math which involves the properties of integers is
More informationPackage deductive. June 2, 2017
Package deductive June 2, 2017 Maintainer Mark van der Loo License GPL-3 Title Data Correction and Imputation Using Deductive Methods LazyData no Type Package LazyLoad yes Attempt
More informationChapter 9: Dealing with Errors
Chapter 9: Dealing with Errors What we will learn: How to identify errors Categorising different types of error How to fix different errors Example of errors What you need to know before: Writing simple
More informationOperations On Data CHAPTER 4. (Solutions to Odd-Numbered Problems) Review Questions
CHAPTER 4 Operations On Data (Solutions to Odd-Numbered Problems) Review Questions 1. Arithmetic operations interpret bit patterns as numbers. Logical operations interpret each bit as a logical values
More informationPackage essurvey. August 23, 2018
Package essurvey August 23, 2018 Title Download Data from the European Social Survey on the Fly Version 1.0.2 BugReports https://github.com/ropensci/essurvey/issues Download data from the European Social
More informationIntroduction to Computer Programming in Python Dr. William C. Bulko. Data Types
Introduction to Computer Programming in Python Dr William C Bulko Data Types 2017 What is a data type? A data type is the kind of value represented by a constant or stored by a variable So far, you have
More informationBinary Diagnostic Tests Clustered Samples
Chapter 538 Binary Diagnostic Tests Clustered Samples Introduction A cluster randomization trial occurs when whole groups or clusters of individuals are treated together. In the twogroup case, each cluster
More information\n is used in a string to indicate the newline character. An expression produces data. The simplest expression
Chapter 1 Summary Comments are indicated by a hash sign # (also known as the pound or number sign). Text to the right of the hash sign is ignored. (But, hash loses its special meaning if it is part of
More informationMARK CARPENTER, Ph.D.
MARK CARPENTER, Ph.D. Module 5 : SAS Functions Introduction to SAS Programming and Applications Descrip(on. In this module, we with various SAS Func7ons, including numerical func7ons, date func7ons and
More informationK Reference Card. Complete example
K Reference Card Complete example package examples.example1 annotation doc : String class Date class Person { name : String age : Int ssnr : Int @doc("employee inherits from Person") class Employee extends
More informationFusionDB: Conflict Management System for Small-Science Databases
Project Number: MYE005 FusionDB: Conflict Management System for Small-Science Databases A Major Qualifying Project submitted to the faculty of Worcester Polytechnic Institute in partial fulfillment of
More informationParsing and Pattern Recognition
Topics in IT 1 Parsing and Pattern Recognition Week 02 String searching and finite-choice languages College of Information Science and Engineering Ritsumeikan University 1 this week string comparison brute
More informationThe SPL Programming Language Reference Manual
The SPL Programming Language Reference Manual Leonidas Fegaras University of Texas at Arlington Arlington, TX 76019 fegaras@cse.uta.edu February 27, 2018 1 Introduction The SPL language is a Small Programming
More informationProgramming R. Manuel J. A. Eugster. Chapter 4: Writing your own functions. Last modification on May 15, 2012
Manuel J. A. Eugster Programming R Chapter 4: Writing your own functions Last modification on May 15, 2012 Draft of the R programming book I always wanted to read http://mjaeugster.github.com/progr Licensed
More informationProtection of the Texts Using Base64 and MD5 Mohammad A. AlAhmad 1,a, Imad Fakhri Al Shaikhli 1,b, Hanady Mohammad Ahmad 2,c 1
Protection of the Texts Using Base64 and MD5 Mohammad A. AlAhmad 1,a, Imad Fakhri Al Shaikhli 1,b, Hanady Mohammad Ahmad 2,c 1 Department of Computer Science, International Islamic University Malaysia,
More informationJin-Soo Kim Systems Software & Architecture Lab. Seoul National University. Integers. Spring 2019
Jin-Soo Kim (jinsoo.kim@snu.ac.kr) Systems Software & Architecture Lab. Seoul National University Integers Spring 2019 4190.308: Computer Architecture Spring 2019 Jin-Soo Kim (jinsoo.kim@snu.ac.kr) 2 A
More informationMicrosoft Access XP (2002) - Advanced Queries
Microsoft Access XP (2002) - Advanced Queries Group/Summary Operations Change Join Properties Not Equal Query Parameter Queries Working with Text IIF Queries Expression Builder Backing up Tables Action
More informationPackage varhandle. R topics documented: July 4, 2018
Version 2.0.3 Date 2018-07-04 Title Functions for Robust Variable Handling Author [aut, cre] Package varhandle July 4, 2018 Maintainer Depends R (>= 3.0.1), Imports utils, graphics
More informationPackage validara. October 19, 2017
Type Package Title Validate Brazilian Administrative Registers Version 0.1.1 Package validara October 19, 2017 Maintainer Gustavo Coelho Contains functions to validate administrative
More informationCOMPUTING SUBJECT KNOWLEDGE AUDIT
COMPUTING SUBJECT KNOWLEDGE AUDIT Use this needs analysis to help self-assess and track your computing subject knowledge. Topic Area 1 Computational thinking Define, explain and use these concepts with
More informationA Small Interpreted Language
A Small Interpreted Language What would you need to build a small computing language based on mathematical principles? The language should be simple, Turing equivalent (i.e.: it can compute anything that
More informationUsing Custom Number Formats
APPENDIX B Using Custom Number Formats Although Excel provides a good variety of built-in number formats, you may find that none of these suits your needs. This appendix describes how to create custom
More informationThe System Transcript, Class Point and Inspectors
Module 4 1 Module 4: The System Transcript, Class Point and Inspectors This module starts by introducing the System Transcript, illustrating how it can be used with a number of examples. The Transcript
More informationCompuScholar, Inc. 9th - 12th grades
CompuScholar, Inc. Alignment to the College Board AP Computer Science A Standards 9th - 12th grades AP Course Details: Course Title: Grade Level: Standards Link: AP Computer Science A 9th - 12th grades
More informationHaskell 98 in short! CPSC 449 Principles of Programming Languages
Haskell 98 in short! n Syntax and type inferencing similar to ML! n Strongly typed! n Allows for pattern matching in definitions! n Uses lazy evaluation" F definition of infinite lists possible! n Has
More informationPROFILE_<PARAM>_QC. What should the variable be and how should it be defined?
PROFILE__QC The PROFILE__QC variables are defined to be the worst QC flag of any level in the profile. A concern was expressed that this definition will lead to a misinterpretation of the
More informationThe RaschSampler Package
The RaschSampler Package November 9, 2006 Type Package Title Rasch Sampler Version 0.8.0 Date 2006-10-07 Author Reinhold Hatzinger, Patrick Mair, Norman Verhelst Maintainer Depends stats
More informationPackage librarian. R topics documented:
Package librarian July 8, 2018 Title Install, Update, Load Packages from CRAN and 'GitHub' in One Step Version 1.3.0 Automatically install, update, and load 'CRAN' and 'GitHub' packages in a single function
More informationCS 231 Data Structures and Algorithms, Fall 2016
CS 231 Data Structures and Algorithms, Fall 2016 Dr. Bruce A. Maxwell Department of Computer Science Colby College Course Description Focuses on the common structures used to store data and the standard
More informationSummer School on Post-Quantum Cryptography 2017, TU Eindhoven Exercises on Hash-based Signature Schemes
Summer School on Post-Quantum Cryptography 2017, TU Eindhoven Exercises on Hash-based Signature Schemes 1 Lamport Consider Lamport s one-time signature scheme. Let messages be of length n and assume that
More informationCS-211 Fall 2017 Test 1 Version Practice For Test on Oct. 2, Name:
CS-211 Fall 2017 Test 1 Version Practice For Test on Oct. 2, 2017 True/False Questions... Name: 1. (10 points) For the following, Check T if the statement is true, the F if the statement is false. (a)
More informationPackage XRJulia. October 20, 2017
Type Package Title Structured Interface to 'Julia' Version 0.7.6 Date 2017-10-20 Author John M. Chambers Package XRJulia October 20, 2017 Maintainer John Chambers A 'Julia' interface
More informationSemi-free start collision attack on Blender
Semi-free start collision attack on Blender Xu Liangyu and Li Ji Sony China Research Laboratory {Liangyu.Xu, Ji.Li}@sony.com.cn Abstract. Blender is a cryptographic hash function submitted to NIST s SHA3
More informationFaculty of Science FINAL EXAMINATION
Faculty of Science FINAL EXAMINATION COMPUTER SCIENCE COMP 250 INTRODUCTION TO COMPUTER SCIENCE Examiner: Prof. Michael Langer April 27, 2010 Associate Examiner: Mr. Joseph Vybihal 9 A.M. 12 P.M. Instructions:
More informationx = 3 * y + 1; // x becomes 3 * y + 1 a = b = 0; // multiple assignment: a and b both get the value 0
6 Statements 43 6 Statements The statements of C# do not differ very much from those of other programming languages. In addition to assignments and method calls there are various sorts of selections and
More informationPackage datetimeutils
Type Package Title Utilities for Dates and Times Version 0.2-12 Date 2018-02-28 Package datetimeutils March 10, 2018 Maintainer Utilities for handling dates and times, such as selecting
More informationLecture Overview. [Scott, chapter 7] [Sebesta, chapter 6]
1 Lecture Overview Types 1. Type systems 2. How to think about types 3. The classification of types 4. Type equivalence structural equivalence name equivalence 5. Type compatibility 6. Type inference [Scott,
More informationExperiences in Building a Compiler for an Object-Oriented Language
Experiences in Building a Compiler for an Object-Oriented Language José de Oliveira Guimarães Departamento de Computação UFSCar, São Carlos - SP, Brazil jose@dc.ufscar.br Abstract Traditionally books on
More informationClasses, Objects, and OOP in Java. June 16, 2017
Classes, Objects, and OOP in Java June 16, 2017 Which is a Class in the below code? Mario itsame = new Mario( Red Hat? ); A. Mario B. itsame C. new D. Red Hat? Whats the difference? int vs. Integer A.
More informationProject 3: Base64 Content-Transfer-Encoding
CMSC 313, Computer Organization & Assembly Language Programming Section 0101 Fall 2001 Project 3: Base64 Content-Transfer-Encoding Due: Tuesday November 13, 2001 Objective The objectives of this programming
More informationPOL 345: Quantitative Analysis and Politics
POL 345: Quantitative Analysis and Politics Precept Handout 1 Week 2 (Verzani Chapter 1: Sections 1.2.4 1.4.31) Remember to complete the entire handout and submit the precept questions to the Blackboard
More informationPackage crossword.r. January 19, 2018
Date 2018-01-13 Type Package Title Generating s from Word Lists Version 0.3.5 Author Peter Meissner Package crossword.r January 19, 2018 Maintainer Peter Meissner Generate crosswords
More informationFinal Programming Project
Due Thursday, Dec. 7, at 5:00 pm Logistics This assignment should be completed in groups of 3. This is not optional -- you are not allowed to complete it on your own, or in groups of any other size. I
More informationProject 1. due date Sunday July 8, 2018, 12:00 noon
Queens College, CUNY, Department of Computer Science Object-oriented programming in C++ CSCI 211 / 611 Summer 2018 Instructor: Dr. Sateesh Mane c Sateesh R. Mane 2018 Project 1 due date Sunday July 8,
More informationDay05 A. Young W. Lim Sat. Young W. Lim Day05 A Sat 1 / 14
Day05 A Young W. Lim 2017-10-07 Sat Young W. Lim Day05 A 2017-10-07 Sat 1 / 14 Outline 1 Based on 2 Structured Programming (2) Conditions and Loops Conditional Statements Loop Statements Type Cast Young
More informationSAS Graphics Macros for Latent Class Analysis Users Guide
SAS Graphics Macros for Latent Class Analysis Users Guide Version 2.0.1 John Dziak The Methodology Center Stephanie Lanza The Methodology Center Copyright 2015, Penn State. All rights reserved. Please
More informationIntroduction to Software Security Hash Functions (Chapter 5)
Introduction to Software Security Hash Functions (Chapter 5) Seong-je Cho Spring 2018 Computer Security & Operating Systems Lab, DKU Sources / References Textbook, Chapter 5. An Illustrated Guide to Cryptographic
More informationEDMS. Architecture and Concepts
EDMS Engineering Data Management System Architecture and Concepts Hannu Peltonen Helsinki University of Technology Department of Computer Science Laboratory of Information Processing Science Abstract
More information